tip
Although best practices for long-term keys are provided below, we still recommend that you prioritize temporary keys for Cloud as a Service access, please refer to the Temporary Security Credentialing Scheme Recommendation at the end of this article.
**Do not create a new master account key: **The master account key has all the permissions of the account. Once leaked, it may affect the security of cloud resources in the entire account. Therefore, it is strongly recommended not to use the master account key for program development.
**Use child user keys with minimal permissions: **It is recommended to create a separate IAM user (also known as a "workload user" or "service account") for the application, assign the minimum permissions required to that IAM user, and use this user's key for program development.
**Strict division of program users and personnel users: **Strict division of personnel users and program users (workload users) is recommended. Avoid people users who can create keys or program users who can be logged in. This can avoid key leakage or misoperation caused by improper management of operation and maintenance personnel, and also avoid the user key being cleared with the user when personnel transfer or leave.
Using a fixed key for a long time increases the risk of key leakage. It is recommended to rotate the key regularly, and the maximum rotation time is recommended to be no more than 90 days.
tip
After the function of the last access time of the key is launched, the system automatically traces the access records after January 1, 2024, and the access before January 1, 2024 is not within the scope of statistics. The specific impact is that if the access key has never been used after January 1, 2024, the most recent access time is not explicit.
When the key has not been rotated for more than 90 days, the system will give a prompt, suggesting that you process the key in time. It is recommended to disable and delete keys that have not been used for a long time.
Never write an API key into code or store it in a code repository to prevent the key from being shared with the code.
Avoid placing API keys in a public environment (e.g. uploading to GitHub).
Avoid placing the API key in a client side environment or cloud computing resource. For such scenarios, please refer to the Temporary Security Certificate (STS) scheme at the end of this article.
When you need to initiate access from Volcano Engine compute resources or other untrusted environments, the following scenarios are recommended:
| scene | plan |
|---|---|
| Cloud as a Service | Use Instance Role to access through instance metadata. |
| In-Container Service Access | Use the IRSA scheme. |
| Client side and other not fully trusted environment access | Use a role-playing scheme for trusted accounts . |